ニュース

The little snippet of Python code strikes fast and nasty, taking less than three hours to complete a ransomware attack from initial breach to encryption.
Operators of an unknown ransomware gang are using a Python script to encrypt virtual machines hosted on VMware ESXi servers.
It didn’t take them long to log into the hypervisor to deploy the Python ransomware. “Python is a coding language not commonly used for ransomware.
The Python ransomware targets those that have accidentally left their environments vulnerable. The researchers set up a honeypot containing an exposed Jupyter notebook application to observe the ...
Developer Leaks LockBit 3.0 Ransomware-Builder Code Code could allow other attackers to develop copycat versions of the malware, but it could help researchers understand the threat better as well.
The young hacker recently uploaded multiple malicious Python packages containing ransomware scripts to the Python Package Index (PyPI), supposedly as an experiment.
Ransomware as a Service (RaaS) has emerged as the dominant business model among large ransomware groups. In this model RaaS groups focus on developing novel ransomware code and attracting affiliates.
A Ukrainian researcher named 'Conti Leaks' has leaked data and source code belonging to the Conti ransomware gang.
New versions of Conti's ransomware source code have been reportedly leaked by a researcher displeased with the group's public declaration of support to Russia.
A Ukrainian security researcher has published more source code from the Conti ransomware operation in retaliation for the gang's support for Russia during Ukraine's invasion.